US20170331631A1 - A method and device for authentication - Google Patents

A method and device for authentication Download PDF

Info

Publication number
US20170331631A1
US20170331631A1 US15/531,099 US201515531099A US2017331631A1 US 20170331631 A1 US20170331631 A1 US 20170331631A1 US 201515531099 A US201515531099 A US 201515531099A US 2017331631 A1 US2017331631 A1 US 2017331631A1
Authority
US
United States
Prior art keywords
key
secret
proving
protected
prover
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US15/531,099
Other versions
US10547451B2 (en
Inventor
Roel Johan Corneel PEETERS
Jens HERMANS
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nextauth Nv
Original Assignee
Katholieke Universiteit Leuven
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from GBGB1421130.4A external-priority patent/GB201421130D0/en
Priority claimed from GB201501071A external-priority patent/GB201501071D0/en
Application filed by Katholieke Universiteit Leuven filed Critical Katholieke Universiteit Leuven
Assigned to KATHOLIEKE UNIVERSITEIT LEUVEN reassignment KATHOLIEKE UNIVERSITEIT LEUVEN ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HERMANS, Jens, PEETERS, ROEL JOHAN CORNEEL
Publication of US20170331631A1 publication Critical patent/US20170331631A1/en
Assigned to NEXTAUTH NV reassignment NEXTAUTH NV ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: KATHOLIEKE UNIVERSITEIT LEUVEN
Application granted granted Critical
Publication of US10547451B2 publication Critical patent/US10547451B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
    • H04L9/3221Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs interactive zero-knowledge proofs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response

Definitions

  • the invention generally relates to user authentication using a secret and a device, specifically a method and device for two-factor or multi-factor authentication with an online verifier.
  • the invention is characterized in that a compromise of either the secret or either the device storage does not imply a compromise of the authentication.
  • a prover has to authenticate to a verifier.
  • a typical way of achieving this is by the use of public key cryptography: the prover has a private key, only known to the prover and the verifier stores the corresponding public key. The public key thus acts as verification key and the private key as proving key.
  • a cryptographic authentication protocol for example the protocols from ISO/IEC 9798-3 or ISO/IEC 9798-5
  • a secure connection set up using a key establishment protocol e.g. SSL/TLS, ISO/IEC 10117-3
  • the prover authenticates to the verifier.
  • a problem often encountered in such systems is the storage of the private key.
  • this user often has to enter a weak secret (e.g. a password or PIN-code) as part of the authentication process to ensure proper approval by the user.
  • a weak secret e.g. a password or PIN-code
  • the present invention provides a method and device for authentication, comprising a prover and a verifier.
  • a proving key stored in the prover is protected using a secret (e.g. a password, PIN code, and/or biometric sample (e.g. fingerprint, retina-scan, voice recognition)).
  • a secret e.g. a password, PIN code, and/or biometric sample (e.g. fingerprint, retina-scan, voice recognition)
  • a protected key is stored, which, upon providing the correct secret, can be transformed into the original proving key.
  • an incorrect secret is provided, the protected key is recovered into a different proving key.
  • the recovered key is used as part of an authentication protocol between prover and verifier, based on e.g. public key cryptography or symmetric cryptography.
  • An incorrect secret will result in a proving key that is or looks correctly formatted, making it impossible for the prover on its own to determine the correctness.
  • the verifier can lock out the prover from further authentication after
  • the authentication protocol can be arranged such that the recovered proving key itself is not made knowable to the verifier.
  • the authentication protocol may be arranged such that the verifier cannot learn the proving key from observing the protocol.
  • the authentication protocol may be arranged to prevent the verifier from gaining knowledge of the proving key.
  • the recovered proving key can e.g. be used to put a signature in the authentication protocol or be used as secret in a zero-knowledge protocol (e.g. Schnorr).
  • the present invention provides methods for authenticating a prover to a verifier, the prover being provided with a proving key paired to a verification key registered with the verifier, wherein the proving key can be obtained by transforming a protected key and a secret (S) using a transformation (E), characterized in that the prover stores the protected key but does not store the proving key nor the verification key in clear, unless in transient memory.
  • the secret is not stored, or only in transient memory, and input on demand.
  • the methods can be computer implemented methods.
  • the prover herein is also referred to as prover device.
  • the verifier herein is also referred to as verifier device.
  • the invention provides for a method for authenticating a prover device to a verifier device.
  • the prover device includes a non-volatile memory storing a protected key.
  • the prover device includes an input unit arranged for receiving a secret (S) to be input by a user.
  • the user herein is also referred to as the prover.
  • the user inputs the secret into the prover device.
  • the secret is not stored in the prover device, or only in transient memory.
  • the prover device includes a processing unit arranged for transforming the protected key into a proving key using a transformation (E) and the secret (S).
  • E transformation
  • S secret
  • the proving key is paired to a verification key registered with the verifier device.
  • the prover device does not store the proving key nor the verification key in clear, unless in transient memory.
  • the transformation (E) can be such that when the correct secret (S) is provided, the proving key is constructed from the protected key and when an incorrect secret (S′) is provided, a different proving key is constructed from the protected key.
  • the different proving key is not paired to a verification key registered with the verifier.
  • a proving key is constructed. Only when the correct secret is used, the resulting proving key is the proving key paired to the verification key registered with the verifier.
  • said secret (S) can be a weak or strong secret.
  • the prover is arranged for constructing the proving key without communication with an external device, such as a remote server.
  • the different proving key resulting from an incorrect secret is indistinguishable from the correct proving key for anyone without access to the verification key or to an entity performing verification operations using the verification key.
  • RSA Rivest, Shamir, Adleman
  • the prover stores only the encrypted private key, whereas the verifier stores the corresponding RSA public key.
  • the prover will try to recover the RSA private key.
  • the decrypted modulus will be incorrect.
  • the modulus typically needs to be the product of two large primes, which is unlikely for the decryption with an incorrect password: the vast majority of incorrect moduli will have trivial divisors.
  • the chance that such a random number is not divisible by any prime between 1-10,000 is ⁇ 6.1%; the chance that such a random number is not divisible by any prime between 1-100,000 is ⁇ 4.9%; the chance that such a random number is not divisible by any prime between 1-10,000,000 is ⁇ 3.5%; the chance that such a random number is not divisible by any prime between 1-100,000,000 is ⁇ 3.1%.
  • a large ratio of such random numbers can be easily identified by trial division as not satisfying the requirement that the modulus needs to be the product of two large primes.
  • the incorrect proving keys are to a large degree distinguishable from the correct proving key, even without access to the verification key or to an entity performing verification operations using the verification key. Therefore, such known method can be vulnerable to a local brute force attack on the prover, as it is trivial to determine if the resulting modulus can be correct.
  • the proving keys generated when using an incorrect secret are arranged such that at least 50% of these proving keys cannot be computationally proven to not satisfy the criteria for a potentially correct proving key.
  • the set of proving keys generated when using all possible incorrect secret is arranged such that at least 50% of these proving keys can be computationally proven to satisfy the criteria for a potentially correct proving key. More preferably, the percentage is 75%, even more preferably 90%.
  • the set of proving keys generated when using all possible incorrect secrets is arranged such that at least 50% of these proving keys satisfy the criteria for a potentially correct proving key.
  • a proving key generated when using an incorrect secret thus has a chance of at least 50% of satisfying the criteria for a potentially correct proving key.
  • the percentage is 75%, even more preferably 90%.
  • the transformation E is arranged such that it, when using an incorrect secret, generates a proving key having a chance of at least 50% of satisfying the criteria for a potentially correct proving key, more preferably at least 75%, even more preferably at least 90%.
  • the transformation E is arranged such that it, when using an incorrect secret, always generates a proving key satisfying the criteria for a potentially correct proving key.
  • two-factor authentication can also be achieved by asking the user to input a biometric sample like for example a fingerprint, retina-scan, face print, voice sample, handwritten signature, body sensors.
  • biometric samples are not directly used a secret, but the secret is rather derived from the biometric sample combined with additional data that needs to be stored, e.g., in the form of helper data. These helper data ensure that, for the same user, the biometric sample given during enrolment and authentication can be used to derive the same output.
  • an identity token such as for example eID card or ePassport, or smartphone application providing eID or ePassport functionalities.
  • an identity token such as for example eID card or ePassport, or smartphone application providing eID or ePassport functionalities.
  • the user's biometric sample can be captured, possibly with some additional helper data.
  • a verifier can later verify the biometric without the user needing to disclose it to the verifier..
  • the verifier can establish that the presented identity token corresponds to the user presenting it by making the link with his or her biometrics. This could also be used for remote verification of biometrics.
  • the transformation (E) takes additional inputs.
  • the additional inputs are all stored in memory of the prover device, or are input at the prover device.
  • no communication of the prover device with an external device e.g. an external server, is necessary for constructing the prover key.
  • the additional input may e.g. relate to a biometric sample, such as a fingerprint.
  • the method may include multi-factor authentication, such as three factor authentication.
  • the transformation (E) may be arranged for recovering the proving key using the protected key, the secret (e.g. a PIN-code or password), and a biometric sample (e.g. fingerprint, retina-scan, voice recognition).
  • the transformation (E) may be arranged for recovering the proving key using the protected key, the secret, a biometric sample, and additional data.
  • 3 -factor authentication by suppling the secret being a something the user knows, e.g. PIN or password to the transformation and putting something the user is, e.g. the biometric sample (possibly combined with helper data) as additional data into the transformation.
  • the transformation (E) can be such that, regardless of the correctness of the secret (S), it results in a proving key that can be securely used in the authentication protocol (e.g. the proving key should not be ‘weak’).
  • a proving key that can be securely used in the authentication protocol (e.g. the proving key should not be ‘weak’).
  • Such requirements might include:
  • the proposed transformations satisfy several of the aforementioned requirements, several of the transformations even when using a weak secret.
  • the transformation (E) can be such that an adversary with access to the protected key, limited access to the verification key (e.g. through a number of authentication attempts at the verifier) and access to the authentication protocol taking place between a legitimate prover and verifier cannot find the correct proving key.
  • the adversary should not be able to authenticate itself to the verifier as if it possessed the proving key.
  • the transformation (E) is a symmetric encryption algorithm using the secret as key and the protected key as data.
  • the transformation E is adapted to use any function (e.g. XOR, concatenation, symmetric encryption, MAC, hash, PRF . . . ) of the secret and optionally additional inputs as key.
  • the transformation E is a symmetric encryption algorithm using the protected key as key and the secret as data.
  • the data is a function of the secret and optionally additional data.
  • the transformation E is a symmetric encryption algorithm using any function of the secret, protected key and/or additional data as key, and any function of the secret, protected key, and/or additional data as data.
  • the symmetric encryption is replaced with a MAC, symmetric decryption or a pseudo-random function (PRF).
  • PRF pseudo-random function
  • the transformation E is a hash function, using any function of the protected key, secret and/or additional data as input.
  • the transformation E is any function (e.g. XOR, concatenation, symmetric encryption, PRF) taking as inputs the output of any of the above transformations, and optionally additional data.
  • function e.g. XOR, concatenation, symmetric encryption, PRF
  • the transformation E is a key generation function or key derivation function, taking as input the output of any of the above transformations, where the proving key is generated/derived from the output of the transformation.
  • the transformation E generates an intermediate key using the protected key and a secret (S), and uses the intermediate key as seed for generating a proving key.
  • the intermediate key may be a non-structured key while the proving key may be a structured key. This may provide that when using an incorrect secret the proving key satisfies the criteria for a potentially correct proving key, or at least has a chance of at least 50% of satisfying these criteria.
  • the transformation E is a key generation algorithm, using the output of any of the above transformations as seed for a random number generator used during key generation.
  • the transformation E is a function using a combination of the secret, protected key and/or additional data as inputs.
  • the transformation E is a combination of the transformations, as described above, according to other embodiments of the invention.
  • the method further comprises an inverse transformation E′ that constructs the protected key from the proving key and the secret.
  • the inverse transformation takes additional inputs. More specifically the inverse transformation is preferably any of the transformations specified above according to other embodiments of the invention, whereby the protected key is replaced by proving key.
  • the proving and verification key are used in an authentication protocol, whereby said authentication protocol is based on a shared key between prover and verifier or whereby said authentication protocol is based on a private key for the prover and a public key for the verifier.
  • the proving key is different from the verifying key.
  • the verifier blocks access of the prover after one or more failed authentication attempts.
  • the verifier can e.g. block access for a predetermined amount of time, e.g. one hour.
  • the verifier can send a message, e.g. text message such as a warning email, or audio message such as a telephone message, to the prover for informing about the failed authentication attempt(s). It is also possible that the verifier sends such message to an alternative device associated with the user of the prover.
  • the present invention provides prover devices adapted to perform the methods according to embodiments of the invention.
  • the present invention provides authentication systems comprising a prover device and verifier device.
  • the prover device comprises a memory, e.g. a non-transitory memory, and a processing unit, wherein the memory stores a protected key.
  • the processing unit is arranged for transforming the protected key using a transformation (E) and a secret (S) into a proving key, such that when the correct secret (S) is used, the constructed proving key is the proving key paired with a verification key registered with the verifier device, and that when an incorrect secret (S′) is provided a different proving key is constructed.
  • the proving device is arranged such that neither the proving key nor the verification key is stored in clear, with the exception of storage in transient memory.
  • the verifier device can include a processing unit arranged for determining whether a proving key generated by the prover device is a proving key paired with a verification key registered with the verifier device. It will be appreciated that the proving key may be provided, e.g. transmitted to the verifier device. It will be appreciated that it is also possible that data representative of the proving key is provided, e.g. transmitted, to the verifier device.
  • the present invention provides prover devices, comprising a memory, e.g. a non-transitory memory, and a processing unit.
  • the memory stores a protected key.
  • the processing unit is arranged for transforming the protected key using a transformation (E) and a secret (S) into a proving key, such that when the correct secret (S) is used, the constructed proving key is the proving key paired with a verification key, and that when an incorrect secret (S′) is provided a different proving key is constructed.
  • the device is arranged such that neither the proving key nor the verification key is stored in clear, with the exception of storage in transient memory.
  • processing unit of the prover device can be arranged for performing at least part of the methods as described herein. It will be appreciated that the processing unit of the verifier device can be arranged for performing at least part of the methods as described herein.
  • the invention provides a computer program product including computer implementable instructions which when implemented by a programmable computer cause the computer to perform the method as described herein.
  • the invention provides a non-transitory computer readable medium storing computer implementable instructions which when implemented by a programmable computer cause the computer to perform the method as described herein.
  • FIG. 1 schematically illustrates the authentication protocol according to embodiments of the invention.
  • FIG. 2 schematically illustrates an embodiment of a system according to the invention.
  • a device comprising means A and B should not be limited to devices consisting only of components A and B. It means that with respect to the present invention, the only relevant components of the device are A and B.
  • the terms first, second, third and the like in the description and in the claims, are used for distinguishing between similar elements and not necessarily for describing a sequential or chronological order. It is to be understood that the terms so used are interchangeable under appropriate circumstances and that the embodiments of the invention described herein are capable of operation in other sequences than described or illustrated herein.
  • the terms top, bottom, over, under and the like in the description and the claims are used for descriptive purposes and not necessarily for describing relative positions.
  • the present invention advantageously protects against brute forcing on both the prover and verifier side and it does not require storage of the secret on either the verifier or prover.
  • All the examples of the present invention provided below have in common that only a protected key is stored on the prover.
  • the protected key can be stored in non-volatile memory.
  • the verifier only stores the corresponding verification key.
  • the verification key can be stored in non-volatile memory.
  • the method for converting the protected key into the proving key is such that it is not possible to detect when an incorrect secret was entered, i.e. the output will, regardless of the secret, always be a correctly formatted proving key.
  • the only way to verify whether the combination of the secret and protected proving key is correct is to execute the authentication protocol with the verifier. If the correct proving key was obtained (e.g. with the correct secret), the verifier will have the corresponding verification key and the authentication protocol will succeed. Otherwise the verifier will have no matching verification key and the authentication will fail.
  • FIG. 2 shows a schematic representation of a system 1 .
  • the system 1 includes a prover device 2 .
  • the prover device 2 can be a telecommunications device and/or a multimedia device such as a smartphone, laptop, tablet or the like.
  • the system 1 includes a verifier device 4 .
  • the verifier device can be a computer device, e.g. a server.
  • the prover device 2 includes a non-volatile memory 6 .
  • the prover device 2 includes an input unit 8 , such as one or more of a keyboard, touchscreen, camera, microphone, or the like.
  • the prover device can also be a dedicated device.
  • the prover device 2 includes a processing unit 10 .
  • the prover device 2 can include an output unit 12 , such as one or more of a display, a touchscreen, a speaker, or the like.
  • the prover device can include a communications unit 14 , e.g. for communicating with a network or other device.
  • the verifier device 4 includes a non-volatile memory 16 .
  • the verifier device 4 can include an input unit 18 and/or a communications unit 20 similar to that of the prover device.
  • the verifier device 4 includes a processing unit 22 .
  • the non-volatile memory 6 of the prover device 2 stores the protected key.
  • the secret (S) can be input into the input unit 8 by a user.
  • the secret is not stored in the prover device 2 , or only in transient memory.
  • the processing unit 10 transforms the protected key into a proving key using a transformation (E) and the secret (S).
  • the communications unit 14 of the prover device 2 and the communications unit 20 of the verifier device 4 perform an authentication protocol.
  • the processing unit 22 of the verifier device 4 determines whether or not the proving key generated by the prover device 2 is paired to a verification key registered with the verifier device 4 .
  • the prover device 2 does not store the proving key in clear, unless in transient memory.
  • the verification key is preferably not at all stored in the prover device 2 .
  • the authentication protocol is preferably arranged such that the proving key itself is not made knowable to the verifier device 4 .
  • Example 1 consider an authentication mechanism based on public/private keys, where the private keys are formatted such that any bit sequence of appropriate length is a correctly formatted private key.
  • the protected key can be stored in the non-volatile memory 6 of the prover device 2 . Decrypting this protected key using the weak secret results in the original private key or in an incorrect, but correctly formatted, private key. Hence, anyone obtaining the protected private key cannot assess from the protected private key alone whether the decrypted private key is the original private key or another private key.
  • decrypting the protected private key with a guessed weak secret does not provide an indication whether the resulting decrypted private key is the original private key or not.
  • brute forcing is prevented.
  • the weak secret would be a rather weak key for symmetric encryption, it can be made stronger by combining it with additional data (which the prover stores in plain), by passing it through a cryptographic hash function, a key derivation function, etc.
  • additional data can, for example, be random or pseudo-random data.
  • Example 2 instead of protecting the private key directly it is possible to generate the private key based on the weak secret and additional data (which the prover stores in clear).
  • One way of achieving this is by taking a cryptographic hash of the weak secret and the additional data and using this as entropy input for the key generator.
  • key generation is not even necessary, i.e. when the private key is simply equal to the output of the hash function. Entering an incorrect weak secret, e.g. into the input unit 8 , will result into a wrong but correctly formatted private key.
  • Example 3 just as in example 2, one can use a cryptographic hash function combining the weak secret with additional data. Instead of using this output directly, it is first bitwise added (XOR) with an equally long bit string (the ‘mask’) which is stored in plain by the prover. The result is used as input to key generation or directly as private key.
  • XOR bitwise added
  • the ‘mask’ an equally long bit string
  • a new mask is computed as the XOR of the cryptographic hash function with the original weak secret, the cryptographic hash function with the new weak secret and the existing mask. By replacing the old mask with the new, the weak secret is changed.
  • This method can e.g. be used to change the PIN code for bank cards without having to store the PIN at the server or the card.
  • both the verifier and prover will use the same key to execute a (symmetric key based) authentication protocol.
  • the verifier stores the key in plain
  • the prover stores a protected key.
  • the verifier should block the verification key after a number of failed attempts. In order to do so the verifier needs to know which verification key it should block, i.e. it has to know the identity of the prover. This can very easily be achieved by sending along in the authentication protocol an identification string which the prover and verifier share. Note that leakage of this identification string can only result in blockage of accounts, not in false authentications.
  • a better way is the use of a (second) public/private key pair, which the prover uses first to authenticate to the verifier, after which a second authentication phase follows using the protected key.
  • a prover device 2 embodied as a tablet computer that is used to authenticate to verifier device 4 embodied as a webserver through for instance an HTTPS connection.
  • an application When the user clicks on the login button, an application will be triggered on the tablet computer (e.g. browser extension or a separate program) or on another device (e.g. an app on the smartphone of the user).
  • the device running this application stores a protected key in permanent storage, which is paired (during registration on the website) with a verification key stored on the webserver.
  • the application will ask for user confirmation by entering a password or PIN-code, which is used to recover a proving key from the stored protected key using the password or PIN-code.
  • the application will now execute an authentication protocol directly with the webserver in order to authenticate the user on the website. Based on the verification key the webserver can determine whether the correct proving key was recovered, e.g. whether the combination of the password (or PIN-code) and the stored protected key was correct. In case of, in this example, three successive authentication failures, the webserver blocks further access for that user. It will be appreciated that the authentication protocol can be arranged such that the recovered proving key itself is not made knowable to the webserver.
  • the smartphone stores the protected key in permanent storage such that only the payment app can access it.
  • the terminal transfers to the smartphone, amongst others, an identifier of the transaction that is taking place. This transfer can be done through e.g. NFC, scanning a 2D barcode, Bluetooth, or the like.
  • the app Upon receiving the transaction identifier the app will start authenticating to the payment backend server, e.g. through mobile internet.
  • the app presents the user with the payment information and asks the user to enter the PIN-code.
  • the PIN-code is used to reconstruct the proving key (e.g. using one of the transformations described in examples 1 to 3).
  • the proving key is then used to e.g. put a signature in the authentication protocol or used as secret in a zero-knowledge protocol (e.g. Schnorr).
  • the payment backend can then use the verification key to validate the signature or check the zero-knowledge protocol and either execute or deny the payment.
  • a biometric such as a fingerprint.
  • processing units can be embodied as dedicated electronic circuits, possibly including software code portions.
  • the processing units can also be embodied as software code portions executed on, and e.g. stored in, a memory of, a programmable apparatus such as a computer, tablet or smartphone.
  • the embodiments of the invention described with reference to the drawings comprise computer apparatus and processes performed in computer apparatus, the invention also extends to computer programs, particularly computer programs on or in a carrier, adapted for putting the invention into practice.
  • the program may be in the form of source or object code or in any other form suitable for use in the implementation of the processes according to the invention.
  • the carrier may be any entity or device capable of carrying the program.
  • the carrier may comprise a non-transitory storage medium, such as a ROM, for example a CD ROM or a semiconductor ROM, or a magnetic recording medium, for example a floppy disc or hard disk or flash storage, for example a USB stick or SD card.
  • a non-transitory storage medium such as a ROM, for example a CD ROM or a semiconductor ROM, or a magnetic recording medium, for example a floppy disc or hard disk or flash storage, for example a USB stick or SD card.
  • the carrier may be a transmissible carrier such as an electrical or optical signal which may be conveyed via electrical or optical cable or by radio or other means, e.g. via the internet or cloud.
  • the carrier When a program is embodied in a signal which may be conveyed directly by a cable or other device or means, the carrier may be constituted by such cable or other device or means.
  • the carrier may be an integrated circuit in which the program is embedded, the integrated circuit being adapted for performing, or for use in the performance of, the relevant processes.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

A method for authenticating a prover to a verifier, the prover being provided with a proving key paired to a verification key registered with the verifier, wherein the proving key can be obtained by transforming a protected key and a secret (S) using a transformation (E), characterized in that the prover stores the protected key and does not store the corresponding proving key nor the corresponding verification key in clear, with the exception of storage in transient memory.

Description

    FIELD OF THE INVENTION
  • The invention generally relates to user authentication using a secret and a device, specifically a method and device for two-factor or multi-factor authentication with an online verifier. The invention is characterized in that a compromise of either the secret or either the device storage does not imply a compromise of the authentication.
  • BACKGROUND OF THE INVENTION
  • Consider a system where a prover has to authenticate to a verifier. A typical way of achieving this is by the use of public key cryptography: the prover has a private key, only known to the prover and the verifier stores the corresponding public key. The public key thus acts as verification key and the private key as proving key. Using a cryptographic authentication protocol (for example the protocols from ISO/IEC 9798-3 or ISO/IEC 9798-5) or a secure connection (set up using a key establishment protocol e.g. SSL/TLS, ISO/IEC 10117-3) the prover authenticates to the verifier.
  • A problem often encountered in such systems is the storage of the private key. In systems where the prover is associated with a specific user, this user often has to enter a weak secret (e.g. a password or PIN-code) as part of the authentication process to ensure proper approval by the user. There are currently several options for the system to use this weak secret:
      • the weak secret is sent to the verifier (e.g. over a secure connection or using some type of key wrapping mechanism). The verifier stores a database of weak secrets (in plain or protected form). The verifier performs the verification of the weak secret. Depending on the storage used, the verifier either has access to the weak secret directly or the weak secret is easy to brute force. Especially in the case of short PIN codes the number of possible PIN codes is extremely limited, allowing for a fast brute force.
      • A password based authentication protocol is used. Again this requires the verifier to store the weak secret for comparison.
      • The weak secret is used to encapsulate the private key on the prover side. Existing encapsulation mechanism (e.g. disk encryption, key wrapping) all offer key integrity. If an incorrect weak secret is entered the de-encapsulation method detects this and reports an error. This can be done directly, by a specific function of the de-encapsulation method or indirectly, by noticing that the output after de-encapsulation is not a correctly formatted private key. Clearly this creates an issue as it is possible to brute force the weak secret and hence the private key after obtaining the encapsulated private key.
  • To solve the above issues, there is a need for a novel approach and device for authentication.
  • SUMMARY OF THE INVENTION
  • A need still exists for an improved device and method for authentication. These objectives are met by the device according to the independent claims of the present invention. The dependent claims relate to preferred embodiments.
  • The present invention provides a method and device for authentication, comprising a prover and a verifier. A proving key stored in the prover is protected using a secret (e.g. a password, PIN code, and/or biometric sample (e.g. fingerprint, retina-scan, voice recognition)). Instead of storing the proving key in plain, a protected key is stored, which, upon providing the correct secret, can be transformed into the original proving key. When an incorrect secret is provided, the protected key is recovered into a different proving key. The recovered key is used as part of an authentication protocol between prover and verifier, based on e.g. public key cryptography or symmetric cryptography. An incorrect secret will result in a proving key that is or looks correctly formatted, making it impossible for the prover on its own to determine the correctness. The verifier can lock out the prover from further authentication after a number of failed authentication attempts.
  • The authentication protocol can be arranged such that the recovered proving key itself is not made knowable to the verifier. The authentication protocol may be arranged such that the verifier cannot learn the proving key from observing the protocol. The authentication protocol may be arranged to prevent the verifier from gaining knowledge of the proving key. The recovered proving key can e.g. be used to put a signature in the authentication protocol or be used as secret in a zero-knowledge protocol (e.g. Schnorr).
  • The present invention provides methods for authenticating a prover to a verifier, the prover being provided with a proving key paired to a verification key registered with the verifier, wherein the proving key can be obtained by transforming a protected key and a secret (S) using a transformation (E), characterized in that the prover stores the protected key but does not store the proving key nor the verification key in clear, unless in transient memory. The secret is not stored, or only in transient memory, and input on demand.
  • Preferably, the methods can be computer implemented methods.
  • The prover herein is also referred to as prover device. The verifier herein is also referred to as verifier device.
  • Optionally, the invention provides for a method for authenticating a prover device to a verifier device. The prover device includes a non-volatile memory storing a protected key. The prover device includes an input unit arranged for receiving a secret (S) to be input by a user. The user herein is also referred to as the prover. The user inputs the secret into the prover device. The secret is not stored in the prover device, or only in transient memory. The prover device includes a processing unit arranged for transforming the protected key into a proving key using a transformation (E) and the secret (S). The proving key is paired to a verification key registered with the verifier device. The prover device does not store the proving key nor the verification key in clear, unless in transient memory.
  • The transformation (E) can be such that when the correct secret (S) is provided, the proving key is constructed from the protected key and when an incorrect secret (S′) is provided, a different proving key is constructed from the protected key. Preferably, the different proving key is not paired to a verification key registered with the verifier. Hence, regardless of the secret used in constructing the proving key, a proving key is constructed. Only when the correct secret is used, the resulting proving key is the proving key paired to the verification key registered with the verifier. Preferably said secret (S) can be a weak or strong secret. Preferably, the prover is arranged for constructing the proving key without communication with an external device, such as a remote server.
  • Preferably, the different proving key resulting from an incorrect secret is indistinguishable from the correct proving key for anyone without access to the verification key or to an entity performing verification operations using the verification key.
  • It is noted that instances are known in which a proving key resulting from an incorrect secret looks like a potentially correct proving key when considering the exterior appearance of the proving key, while it is still possible to assess that said proving key does not comply with the required criteria for a potentially correct proving key. In such case, it can be assessed that the resulting proving key must be an incorrect proving key, e.g. by computational analysis.
  • For example, it is known to protect an RSA (Rivest, Shamir, Adleman) private key (modulus and exponent) by encrypting it with a key derived from a user password. The prover stores only the encrypted private key, whereas the verifier stores the corresponding RSA public key. Upon inputting a password, the prover will try to recover the RSA private key. When inputting an incorrect password the decrypted modulus will be incorrect. However, there is very high likelihood that the decrypted modulus cannot even be correct. The modulus typically needs to be the product of two large primes, which is unlikely for the decryption with an incorrect password: the vast majority of incorrect moduli will have trivial divisors. As such, such incorrect modulus can be excluded from consideration as being inherently incorrect since it can be computationally proven that it does not satisfy the criteria for a potentially correct modulus. Note for instance that more or less half of the moduli decrypted using an incorrect password will be divisible by two. It can easily be demonstrated that the chance that a random number (such as the decrypted modulus from an incorrect password) is not divisible by any prime between 1-1,000 is ≦8.1%. Similarly, the chance that such a random number is not divisible by any prime between 1-10,000 is ≦6.1%; the chance that such a random number is not divisible by any prime between 1-100,000 is ≦4.9%; the chance that such a random number is not divisible by any prime between 1-10,000,000 is ≦3.5%; the chance that such a random number is not divisible by any prime between 1-100,000,000 is ≦3.1%. Thus a large ratio of such random numbers can be easily identified by trial division as not satisfying the requirement that the modulus needs to be the product of two large primes.
  • Hence, it is possible to dismiss a large ratio of incorrect proving keys as clearly incorrect without testing the proving key with use of the verifier. For example, by trying all random PIN-codes of four digits, the number of possibly correct proving keys can be reduced to approximately 300 candidates, when checking the modulus for divisibility by all primes between 1 and 108. The number of candidates can even be further reduced by using more computation or by using a better performing factoring algorithm than trial division. Hence, the incorrect proving keys are to a large degree distinguishable from the correct proving key, even without access to the verification key or to an entity performing verification operations using the verification key. Therefore, such known method can be vulnerable to a local brute force attack on the prover, as it is trivial to determine if the resulting modulus can be correct.
  • Therefore, preferably the proving keys generated when using an incorrect secret are arranged such that at least 50% of these proving keys cannot be computationally proven to not satisfy the criteria for a potentially correct proving key. The set of proving keys generated when using all possible incorrect secret is arranged such that at least 50% of these proving keys can be computationally proven to satisfy the criteria for a potentially correct proving key. More preferably, the percentage is 75%, even more preferably 90%. This provides the advantage that the different proving key resulting from an incorrect secret is reliably computationally indistinguishable from the correct proving key for anyone without access to the verification key or to an entity performing verification operations using the verification key. Brute forcing is efficiently prevented since at least 50% of the retrieved proving keys would have to be tested for correctness with access to the verification key or to an entity performing verification operations using the verification key.
  • The set of proving keys generated when using all possible incorrect secrets is arranged such that at least 50% of these proving keys satisfy the criteria for a potentially correct proving key. A proving key generated when using an incorrect secret thus has a chance of at least 50% of satisfying the criteria for a potentially correct proving key. Thus, at least 50% of the proving keys generated on the basis of an incorrect secret cannot be excluded as being inherently incorrect proving keys. More preferably, the percentage is 75%, even more preferably 90%. This provides the advantage that the different proving key resulting from an incorrect secret is statistically reliably indistinguishable from the correct proving key for anyone without access to the verification key or to an entity performing verification operations using the verification key. Brute forcing is efficiently prevented since at least 50% of the retrieved proving keys would have to be tested for correctness with access to the verification key or to an entity performing verification operations using the verification key.
  • It will be appreciated that most desirably all (100%) possible proving keys generated when using an incorrect secret satisfy the criteria for a potentially correct proving key, e.g. can be computationally proven to satisfy these criteria. This may not be required for acceptable security, however. This provides the advantage that the different proving key resulting from an incorrect secret is computationally indistinguishable from the correct proving key for anyone without access to the verification key or to an entity performing verification operations using the verification key.
  • Hence, preferably, the transformation E is arranged such that it, when using an incorrect secret, generates a proving key having a chance of at least 50% of satisfying the criteria for a potentially correct proving key, more preferably at least 75%, even more preferably at least 90%. Optionally, the transformation E is arranged such that it, when using an incorrect secret, always generates a proving key satisfying the criteria for a potentially correct proving key.
  • Instead of entering a PIN or password, two-factor authentication can also be achieved by asking the user to input a biometric sample like for example a fingerprint, retina-scan, face print, voice sample, handwritten signature, body sensors. Typically, biometric samples are not directly used a secret, but the secret is rather derived from the biometric sample combined with additional data that needs to be stored, e.g., in the form of helper data. These helper data ensure that, for the same user, the biometric sample given during enrolment and authentication can be used to derive the same output.
  • One may consider an identity token, such as for example eID card or ePassport, or smartphone application providing eID or ePassport functionalities. During enrolment (possibly within a trusted setup) the user's biometric sample can be captured, possibly with some additional helper data. By using this biometric (possibly in combination with helper data), a verifier can later verify the biometric without the user needing to disclose it to the verifier.. The verifier can establish that the presented identity token corresponds to the user presenting it by making the link with his or her biometrics. This could also be used for remote verification of biometrics.
  • In further preferred embodiments the transformation (E) takes additional inputs. Preferably, the additional inputs are all stored in memory of the prover device, or are input at the prover device. Hence, no communication of the prover device with an external device, e.g. an external server, is necessary for constructing the prover key. The additional input may e.g. relate to a biometric sample, such as a fingerprint.
  • The method may include multi-factor authentication, such as three factor authentication. The transformation (E) may be arranged for recovering the proving key using the protected key, the secret (e.g. a PIN-code or password), and a biometric sample (e.g. fingerprint, retina-scan, voice recognition). The transformation (E) may be arranged for recovering the proving key using the protected key, the secret, a biometric sample, and additional data.
  • One may consider identity tokens that require multi-factor authentication, such as 3-factor authentication, by suppling the secret being a something the user knows, e.g. PIN or password to the transformation and putting something the user is, e.g. the biometric sample (possibly combined with helper data) as additional data into the transformation.
  • The transformation (E) can be such that, regardless of the correctness of the secret (S), it results in a proving key that can be securely used in the authentication protocol (e.g. the proving key should not be ‘weak’). Such requirements might include:
      • a sufficient entropy for the resulting proving key when assuming a random protected key or a protected key resulting from the inverse transformation of a random key, even with an incorrect secret;
      • computational or information theoretic indistinguishability of the proving key from a random key, when no access is given to the protected key;
      • computational indistinguishability of the proving key, resulting from the transformation of a random protected key under a known fixed secret, from a random key;
      • statistical indistinguishability of the distribution of proving keys, taken e.g. over the set of protected keys and/or over the set of secrets, from the distribution of random keys;
      • unlinkability of proving keys originating from the same protected key but different secrets; and/or
      • irreversibility of the transformation E, thus preventing recovery of the secret and/or protected key from a proving key.
  • The proposed transformations satisfy several of the aforementioned requirements, several of the transformations even when using a weak secret.
  • The transformation (E) can be such that an adversary with access to the protected key, limited access to the verification key (e.g. through a number of authentication attempts at the verifier) and access to the authentication protocol taking place between a legitimate prover and verifier cannot find the correct proving key. In addition the adversary should not be able to authenticate itself to the verifier as if it possessed the proving key.
  • In preferred embodiments the transformation (E) is a symmetric encryption algorithm using the secret as key and the protected key as data. In embodiments of the present invention the transformation E is adapted to use any function (e.g. XOR, concatenation, symmetric encryption, MAC, hash, PRF . . . ) of the secret and optionally additional inputs as key.
  • In preferred embodiments, the transformation E is a symmetric encryption algorithm using the protected key as key and the secret as data.
  • Preferably the data is a function of the secret and optionally additional data.
  • In preferred embodiments the transformation E is a symmetric encryption algorithm using any function of the secret, protected key and/or additional data as key, and any function of the secret, protected key, and/or additional data as data.
  • In preferred embodiments the symmetric encryption is replaced with a MAC, symmetric decryption or a pseudo-random function (PRF).
  • In further preferred embodiments the transformation E is a hash function, using any function of the protected key, secret and/or additional data as input.
  • In preferred embodiments the transformation E is any function (e.g. XOR, concatenation, symmetric encryption, PRF) taking as inputs the output of any of the above transformations, and optionally additional data.
  • In preferred embodiments the transformation E is a key generation function or key derivation function, taking as input the output of any of the above transformations, where the proving key is generated/derived from the output of the transformation.
  • In preferred embodiments the transformation E generates an intermediate key using the protected key and a secret (S), and uses the intermediate key as seed for generating a proving key.
  • The intermediate key may be a non-structured key while the proving key may be a structured key. This may provide that when using an incorrect secret the proving key satisfies the criteria for a potentially correct proving key, or at least has a chance of at least 50% of satisfying these criteria.
  • In preferred embodiments the transformation E is a key generation algorithm, using the output of any of the above transformations as seed for a random number generator used during key generation.
  • In further preferred embodiments the transformation E is a function using a combination of the secret, protected key and/or additional data as inputs.
  • In preferred embodiments the transformation E is a combination of the transformations, as described above, according to other embodiments of the invention.
  • In preferred embodiments the method further comprises an inverse transformation E′ that constructs the protected key from the proving key and the secret. Preferably the inverse transformation takes additional inputs. More specifically the inverse transformation is preferably any of the transformations specified above according to other embodiments of the invention, whereby the protected key is replaced by proving key.
  • In preferred embodiments the proving and verification key are used in an authentication protocol, whereby said authentication protocol is based on a shared key between prover and verifier or whereby said authentication protocol is based on a private key for the prover and a public key for the verifier. Preferably the proving key is different from the verifying key.
  • In further preferred embodiments the verifier blocks access of the prover after one or more failed authentication attempts. The verifier can e.g. block access for a predetermined amount of time, e.g. one hour. Alternatively, or additionally, the verifier can send a message, e.g. text message such as a warning email, or audio message such as a telephone message, to the prover for informing about the failed authentication attempt(s). It is also possible that the verifier sends such message to an alternative device associated with the user of the prover.
  • In another aspect the present invention provides prover devices adapted to perform the methods according to embodiments of the invention.
  • In a further aspect the present invention provides authentication systems comprising a prover device and verifier device. The prover device comprises a memory, e.g. a non-transitory memory, and a processing unit, wherein the memory stores a protected key. The processing unit is arranged for transforming the protected key using a transformation (E) and a secret (S) into a proving key, such that when the correct secret (S) is used, the constructed proving key is the proving key paired with a verification key registered with the verifier device, and that when an incorrect secret (S′) is provided a different proving key is constructed. The proving device is arranged such that neither the proving key nor the verification key is stored in clear, with the exception of storage in transient memory. The verifier device can include a processing unit arranged for determining whether a proving key generated by the prover device is a proving key paired with a verification key registered with the verifier device. It will be appreciated that the proving key may be provided, e.g. transmitted to the verifier device. It will be appreciated that it is also possible that data representative of the proving key is provided, e.g. transmitted, to the verifier device.
  • In an aspect the present invention provides prover devices, comprising a memory, e.g. a non-transitory memory, and a processing unit. The memory stores a protected key. The processing unit is arranged for transforming the protected key using a transformation (E) and a secret (S) into a proving key, such that when the correct secret (S) is used, the constructed proving key is the proving key paired with a verification key, and that when an incorrect secret (S′) is provided a different proving key is constructed. The device is arranged such that neither the proving key nor the verification key is stored in clear, with the exception of storage in transient memory.
  • It will be appreciated that the processing unit of the prover device can be arranged for performing at least part of the methods as described herein. It will be appreciated that the processing unit of the verifier device can be arranged for performing at least part of the methods as described herein.
  • In an aspect, the invention provides a computer program product including computer implementable instructions which when implemented by a programmable computer cause the computer to perform the method as described herein. In a further aspect, the invention provides a non-transitory computer readable medium storing computer implementable instructions which when implemented by a programmable computer cause the computer to perform the method as described herein.
  • It will be appreciated that any of the aspects and/or embodiments of the invention can be combined. It will also be clear that all features and advantages mentioned in view of the method apply equally to the prover devices and/or authentication system, and vice versa.
  • Particular and preferred aspects of the invention are set out in the accompanying independent and dependent claims. Features from the dependent claims may be combined with features of the independent claims and with features of other dependent claims as appropriate and not merely as explicitly set out in the claims.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • Further features of the present invention will become apparent from the examples and figures, wherein:
  • FIG. 1 schematically illustrates the authentication protocol according to embodiments of the invention; and
  • FIG. 2 schematically illustrates an embodiment of a system according to the invention.
  • DETAILED DESCRIPTION
  • The present invention will be described with respect to particular embodiments and with reference to certain drawings but the invention is not limited thereto but only by the claims. The drawings described are only schematic and are non-limiting. In the drawings, the size of some of the elements may be exaggerated and not drawn on scale for illustrative purposes. Where the term “comprising” is used in the present description and claims, it does not exclude other elements or steps. Where an indefinite or definite article is used when referring to a singular noun e.g. “a” or “an”, “the”, this includes a plural of that noun unless something else is specifically stated. The term “comprising”, used in the claims, should not be interpreted as being restricted to the means listed thereafter; it does not exclude other elements or steps. Thus, the scope of the expression “a device comprising means A and B” should not be limited to devices consisting only of components A and B. It means that with respect to the present invention, the only relevant components of the device are A and B. Furthermore, the terms first, second, third and the like in the description and in the claims, are used for distinguishing between similar elements and not necessarily for describing a sequential or chronological order. It is to be understood that the terms so used are interchangeable under appropriate circumstances and that the embodiments of the invention described herein are capable of operation in other sequences than described or illustrated herein. Moreover, the terms top, bottom, over, under and the like in the description and the claims are used for descriptive purposes and not necessarily for describing relative positions. It is to be understood that the terms so used are interchangeable under appropriate circumstances and that the embodiments of the invention described herein are capable of operation in other orientations than described or illustrated herein. In the drawings, like reference numerals indicate like features; and, a reference numeral appearing in more than one figure refers to the same element. The drawing and the following detailed descriptions shows specific embodiments of a method and device for authentication according to the present invention.
  • The present invention advantageously protects against brute forcing on both the prover and verifier side and it does not require storage of the secret on either the verifier or prover. All the examples of the present invention provided below have in common that only a protected key is stored on the prover. The protected key can be stored in non-volatile memory. The verifier only stores the corresponding verification key. The verification key can be stored in non-volatile memory. The method for converting the protected key into the proving key is such that it is not possible to detect when an incorrect secret was entered, i.e. the output will, regardless of the secret, always be a correctly formatted proving key. The only way to verify whether the combination of the secret and protected proving key is correct is to execute the authentication protocol with the verifier. If the correct proving key was obtained (e.g. with the correct secret), the verifier will have the corresponding verification key and the authentication protocol will succeed. Otherwise the verifier will have no matching verification key and the authentication will fail.
  • FIG. 2 shows a schematic representation of a system 1. The system 1 includes a prover device 2. The prover device 2 can be a telecommunications device and/or a multimedia device such as a smartphone, laptop, tablet or the like. The system 1 includes a verifier device 4. The verifier device can be a computer device, e.g. a server.
  • The prover device 2 includes a non-volatile memory 6. The prover device 2 includes an input unit 8, such as one or more of a keyboard, touchscreen, camera, microphone, or the like. The prover device can also be a dedicated device. The prover device 2 includes a processing unit 10. The prover device 2 can include an output unit 12, such as one or more of a display, a touchscreen, a speaker, or the like. The prover device can include a communications unit 14, e.g. for communicating with a network or other device.
  • The verifier device 4 includes a non-volatile memory 16. The verifier device 4 can include an input unit 18 and/or a communications unit 20 similar to that of the prover device. The verifier device 4 includes a processing unit 22.
  • The non-volatile memory 6 of the prover device 2 stores the protected key. The secret (S) can be input into the input unit 8 by a user. The secret is not stored in the prover device 2, or only in transient memory. The processing unit 10 transforms the protected key into a proving key using a transformation (E) and the secret (S). The communications unit 14 of the prover device 2 and the communications unit 20 of the verifier device 4 perform an authentication protocol. The processing unit 22 of the verifier device 4 determines whether or not the proving key generated by the prover device 2 is paired to a verification key registered with the verifier device 4.
  • The prover device 2 does not store the proving key in clear, unless in transient memory. The verification key is preferably not at all stored in the prover device 2. The authentication protocol is preferably arranged such that the proving key itself is not made knowable to the verifier device 4.
  • Example 1: consider an authentication mechanism based on public/private keys, where the private keys are formatted such that any bit sequence of appropriate length is a correctly formatted private key. In this case, one can encrypt (e.g. using a block cipher in a certain mode) the private key using the weak secret to obtain the protected private key. The protected key can be stored in the non-volatile memory 6 of the prover device 2. Decrypting this protected key using the weak secret results in the original private key or in an incorrect, but correctly formatted, private key. Hence, anyone obtaining the protected private key cannot assess from the protected private key alone whether the decrypted private key is the original private key or another private key. Hence decrypting the protected private key with a guessed weak secret does not provide an indication whether the resulting decrypted private key is the original private key or not. As there is no feedback on the correctness of the decrypted private key (at least not without accessing the verifier), brute forcing is prevented.
  • As the weak secret would be a rather weak key for symmetric encryption, it can be made stronger by combining it with additional data (which the prover stores in plain), by passing it through a cryptographic hash function, a key derivation function, etc. The additional data can, for example, be random or pseudo-random data.
  • Example 2: instead of protecting the private key directly it is possible to generate the private key based on the weak secret and additional data (which the prover stores in clear). One way of achieving this, is by taking a cryptographic hash of the weak secret and the additional data and using this as entropy input for the key generator. In some cases key generation is not even necessary, i.e. when the private key is simply equal to the output of the hash function. Entering an incorrect weak secret, e.g. into the input unit 8, will result into a wrong but correctly formatted private key. Hence from the format of the generated private key it cannot be determined whether or not the generated private key is the original private key, since the format of the generated private key satisfies the criteria for a potentially correct private key.
  • Example 3: just as in example 2, one can use a cryptographic hash function combining the weak secret with additional data. Instead of using this output directly, it is first bitwise added (XOR) with an equally long bit string (the ‘mask’) which is stored in plain by the prover. The result is used as input to key generation or directly as private key. The advantage of this method is that it supports changing the weak secret.
  • For example, when changing the weak secret, a new mask is computed as the XOR of the cryptographic hash function with the original weak secret, the cryptographic hash function with the new weak secret and the existing mask. By replacing the old mask with the new, the weak secret is changed. This method can e.g. be used to change the PIN code for bank cards without having to store the PIN at the server or the card.
  • The same techniques can be used when using a symmetric setup instead of a private/public key. In this case both the verifier and prover will use the same key to execute a (symmetric key based) authentication protocol. The verifier stores the key in plain, the prover stores a protected key.
  • To protect against brute forcing by executing the authentication protocol with the verifier multiple times, the verifier should block the verification key after a number of failed attempts. In order to do so the verifier needs to know which verification key it should block, i.e. it has to know the identity of the prover. This can very easily be achieved by sending along in the authentication protocol an identification string which the prover and verifier share. Note that leakage of this identification string can only result in blockage of accounts, not in false authentications. A better way is the use of a (second) public/private key pair, which the prover uses first to authenticate to the verifier, after which a second authentication phase follows using the protected key.
  • In another example one can consider a prover device 2 embodied as a tablet computer that is used to authenticate to verifier device 4 embodied as a webserver through for instance an HTTPS connection. When the user clicks on the login button, an application will be triggered on the tablet computer (e.g. browser extension or a separate program) or on another device (e.g. an app on the smartphone of the user). The device running this application stores a protected key in permanent storage, which is paired (during registration on the website) with a verification key stored on the webserver. The application will ask for user confirmation by entering a password or PIN-code, which is used to recover a proving key from the stored protected key using the password or PIN-code. The application will now execute an authentication protocol directly with the webserver in order to authenticate the user on the website. Based on the verification key the webserver can determine whether the correct proving key was recovered, e.g. whether the combination of the password (or PIN-code) and the stored protected key was correct. In case of, in this example, three successive authentication failures, the webserver blocks further access for that user. It will be appreciated that the authentication protocol can be arranged such that the recovered proving key itself is not made knowable to the webserver.
  • In yet another example one may consider a smartphone with an app for mobile payments. The smartphone stores the protected key in permanent storage such that only the payment app can access it. When approaching a payment terminal, the terminal transfers to the smartphone, amongst others, an identifier of the transaction that is taking place. This transfer can be done through e.g. NFC, scanning a 2D barcode, Bluetooth, or the like. Upon receiving the transaction identifier the app will start authenticating to the payment backend server, e.g. through mobile internet. During authentication the app presents the user with the payment information and asks the user to enter the PIN-code. The PIN-code is used to reconstruct the proving key (e.g. using one of the transformations described in examples 1 to 3). The proving key is then used to e.g. put a signature in the authentication protocol or used as secret in a zero-knowledge protocol (e.g. Schnorr). The payment backend can then use the verification key to validate the signature or check the zero-knowledge protocol and either execute or deny the payment. Instead of, or addition to entering a PIN-code, the user may also be required to enter a biometric, such as a fingerprint.
  • It will be appreciated that the processing units can be embodied as dedicated electronic circuits, possibly including software code portions. The processing units can also be embodied as software code portions executed on, and e.g. stored in, a memory of, a programmable apparatus such as a computer, tablet or smartphone.
  • Although the embodiments of the invention described with reference to the drawings comprise computer apparatus and processes performed in computer apparatus, the invention also extends to computer programs, particularly computer programs on or in a carrier, adapted for putting the invention into practice. The program may be in the form of source or object code or in any other form suitable for use in the implementation of the processes according to the invention. The carrier may be any entity or device capable of carrying the program.
  • For example, the carrier may comprise a non-transitory storage medium, such as a ROM, for example a CD ROM or a semiconductor ROM, or a magnetic recording medium, for example a floppy disc or hard disk or flash storage, for example a USB stick or SD card. Further, the carrier may be a transmissible carrier such as an electrical or optical signal which may be conveyed via electrical or optical cable or by radio or other means, e.g. via the internet or cloud.
  • When a program is embodied in a signal which may be conveyed directly by a cable or other device or means, the carrier may be constituted by such cable or other device or means. Alternatively, the carrier may be an integrated circuit in which the program is embedded, the integrated circuit being adapted for performing, or for use in the performance of, the relevant processes.
  • However, other modifications, variations, and alternatives are also possible. The specifications, drawings and examples are, accordingly, to be regarded in an illustrative sense rather than in a restrictive sense.
  • For the purpose of clarity and a concise description features are described herein as part of the same or separate embodiments, however, it will be appreciated that the scope of the invention may include embodiments having combinations of all or some of the features described. It is to be understood that this invention is not limited to the particular features of the means and/or the process steps of the methods described as such means and methods may vary. It is also to be understood that the terminology used herein is for purposes of describing particular embodiments only, and is not intended to be limiting. It must be noted that, as used in the specification and the appended claims, the singular forms “a” “an” and “the” include singular and/or plural referents unless the context clearly dictates otherwise. It is also to be understood that plural forms include singular and/or plural referents unless the context clearly dictates otherwise. It is moreover to be understood that, in case parameter ranges are given which are delimited by numeric values, the ranges are deemed to include these limitation values. The mere fact that certain measures are recited in mutually different claims does not indicate that a combination of these measures cannot be used to an advantage.

Claims (29)

1. A computer implemented method for authenticating a prover to a verifier, the prover being provided with a proving key paired to a verification key registered with the verifier, wherein the proving key can be obtained by transforming a protected key and a secret using a transformation,
wherein the prover stores the protected key and does not store the corresponding proving key nor the corresponding verification key in clear, with the exception of storage in transient memory,
whereby the transformation is such that:
when the correct secret is provided, the proving key is constructed from the protected key; and
when an incorrect secret is provided, a different proving key is constructed from the protected key.
2. The method of claim 1, wherein the different proving key has the format of a potentially correct proving key.
3. The method of claim 1, whereby the different proving key resulting from an incorrect secret is indistinguishable from the correct proving key for anyone without access to the verification key or to an entity performing verification operations using the verification key.
4. The method of claim 1, wherein the set of possible proving keys generated when using an incorrect secret is arranged such that at least 50% of these proving keys satisfy the criteria for a potentially correct proving key.
5. The method of claim 1, wherein the different proving key generated when using an incorrect secret has a chance of at least 50% of satisfying the criteria for a potentially correct proving key.
6. The method of claim 1, whereby said secret can be a weak or strong secret.
7. The method of claim 1, whereby said secret is derived from a biometric sample, possibly combined with additional inputs, such as helper data.
8. The method of claim 1, wherein the transformation takes additional inputs.
9. The method of claim 1, wherein the prover constructs the proving key without communication with an external device, such as a remote server.
10. The method of claim 1, wherein the transformation is one of:
a) function using one or more of the secret, the protected key and additional data as inputs,
b) a symmetric encryption algorithm using any function of one or more of the secret, the protected key and additional data as key,
c) a symmetric encryption algorithm using any function of one or more of the secret the protected key and additional data as data,
d) a symmetric encryption algorithm using the secret as key and the protected key as data
e) a symmetric encryption algorithm using the protected key as key and he secret as data,
f) adapted to use XOR, concatenation, symmetric encryption, MAC, hash, or the like, of the secret as key,
g) a hash function, using any function of one ore more of the protected key, the secret and additional data as input,
or a combination thereof.
11-14. (canceled)
15. The method of claim 10, whereby the symmetric encryption is replaced with a MAC, symmetric decryption or a pseudo-random function.
16. (canceled)
17. The method of claim 1, whereby the transformation is any function, such as XOR, concatenation, symmetric encryption, PRF, or the like, taking as inputs the output of any of the above transformations, and optionally additional data.
18. The method of claim 1, whereby the transformation is a key generation function or key derivation function, taking as input the output of any of the above transformations, where the proving key is generated/derived from the output of the transformation.
19. The method of claim 1, whereby the transformation is a key generation algorithm, using the output of any of the above transformations as seed for a random number generator used during key generation.
20. (canceled)
21. The method of claim 1, whereby the transformation is one of:
a) function using one or more of the secret, the protected key and additional data as inputs,
b) a symmetric encryption algorithm using any function of one or more of the secret, the protected key and additional data as key,
c) a symmetric encryption algorithm using any function of one or more of the secret, the protected key and additional data as data,
d) a symmetric encryption algorithm using the secret as key and the protected key as data,
e) a symmetric encryption algorithm using the protected key as key and the secret as data,
f) adapted to use XOR, concatenation, symmetric encryption, MAC, hash, PRF, or the like, of the secret as key,
g) a hash function, using any function of one ore more of the protected key, the secret and additional data as input,
or a combination thereof
22. The method of claim 1, further comprising an inverse transformation that constructs the protected key from the proving key and the secret.
23. The method of claim 22, whereby the inverse transformation takes additional inputs.
24. The method of claim 22, whereby the inverse transformation is one of:
a) function using one or more of the secret, the protected key and additional data as inputs,
b) a symmetric encryption algorithm using any function of one or more of the secret, the protected key and additional data as key,
c) a symmetric encryption algorithm using any function of one or more of the secret, the protected key and additional data as data,
d) a symmetric encryption algorithm using the secret as key and the protected key as data,
e) a symmetric encryption algorithm using the protected key as key and the secret as data,
f) adapted to use XOR, concatenation, symmetric encryption, MAC, hash, PRF, or the like, of the secret as key,
g) a hash function, using any function of one ore more of the protected key, the secret and additional data as input,
or a combination thereof,
where the protected key is replaced by the proving key.
25. The method of claim 1, whereby the proving and verification key are used in an authentication protocol, whereby said authentication protocol is based on a shared key between prover and verifier or whereby said authentication protocol is based on a private key for the prover and a public key for the verifier.
26. The method of claim 1, wherein the proving key is used in an authentication protocol, and the proving key is used to put a signature in the authentication protocol or is used as secret in a zero-knowledge protocol.
27. The method of claim 1, whereby the verifier blocks access of the prover after one or more failed authentication attempts.
28-30. (canceled)
31. A prover device comprising a memory and a processing unit, wherein the memory stores a protected key, wherein the processing unit is arranged for transforming the protected key using a transformation and a secret into a proving key, wherein the proving device is arranged such that neither the proving key nor the verification key is stored in clear, with the exception of storage in transient memory, wherein the transformation is such that:
when the correct secret is provided, the proving key is constructed from the protected key; and
when an incorrect secret is provided, a different proving key is constructed from the protected key.
32. (canceled)
33. A non-transitory computer readable medium storing computer implementable instructions which when implemented by a programmable computer cause the computer to perform the method according to claim 1.
34. The prover device of claim 31, in combination with a verifier device including a processing unit arranged for determining whether a proving key generated by the prover device is a proving key paired with a verification key registered with the verifier device.
US15/531,099 2014-11-28 2015-11-30 Method and device for authentication Active 2036-07-08 US10547451B2 (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
GBGB1421130.4A GB201421130D0 (en) 2014-11-28 2014-11-28 A method and device for authentication
GB1421130.4 2014-11-28
GB1501071.3 2015-01-22
GB201501071A GB201501071D0 (en) 2015-01-22 2015-01-22 A method and device for authentication
PCT/EP2015/078077 WO2016083618A1 (en) 2014-11-28 2015-11-30 A method and device for authentication

Publications (2)

Publication Number Publication Date
US20170331631A1 true US20170331631A1 (en) 2017-11-16
US10547451B2 US10547451B2 (en) 2020-01-28

Family

ID=54705648

Family Applications (1)

Application Number Title Priority Date Filing Date
US15/531,099 Active 2036-07-08 US10547451B2 (en) 2014-11-28 2015-11-30 Method and device for authentication

Country Status (4)

Country Link
US (1) US10547451B2 (en)
EP (1) EP3224983B1 (en)
CA (1) CA2969332C (en)
WO (1) WO2016083618A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112434269A (en) * 2020-10-23 2021-03-02 上海点融信息科技有限责任公司 Zero knowledge proof method, verification method, computing device and storage medium of file
US11218320B2 (en) * 2019-06-28 2022-01-04 Intel Corporation Accelerators for post-quantum cryptography secure hash-based signing and verification
CN114584291A (en) * 2022-02-18 2022-06-03 杭州代码狗科技有限公司 Key protection method, device, equipment and storage medium based on HMAC algorithm
US11449588B2 (en) * 2019-03-18 2022-09-20 Lg Electronics Inc. Electronic device and method for controlling the same
US11575521B2 (en) 2019-06-28 2023-02-07 Intel Corporation Fast XMSS signature verification and nonce sampling process without signature expansion

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10320781B2 (en) 2016-12-08 2019-06-11 Sensoriant, Inc. System and methods for sharing and trading user data and preferences between computer programs and other entities while preserving user privacy
US11120507B2 (en) 2016-04-14 2021-09-14 Sensoriant, Inc. Confirmation and rating of user generated activities
WO2018140860A1 (en) * 2017-01-27 2018-08-02 Sensoriant, Inc. System and methods for sharing and trading user data and preferences between computer programs and other entities while preserving user privacy

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020141575A1 (en) * 2001-03-29 2002-10-03 Hird Geoffrey R. Method and apparatus for secure cryptographic key generation, certification and use
US20040003246A1 (en) * 2002-06-28 2004-01-01 Compaq Information Technologies Group, L.P. Method and system for secure storage, transmission and control of cryptographic keys
US20040148509A1 (en) * 2001-03-23 2004-07-29 Yong Dong Wu Method of using biometric information for secret generation
US20080229103A1 (en) * 2007-03-13 2008-09-18 Board Of Trustees Of Michigan State University Private entity authentication for pervasive computing environments
US20100183148A1 (en) * 2009-01-19 2010-07-22 International Business Machines Corporation Recording keys in a broadcast-encryption-based system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6950523B1 (en) * 2000-09-29 2005-09-27 Intel Corporation Secure storage of private keys
US7596704B2 (en) * 2003-10-10 2009-09-29 Jing-Jang Hwang Partition and recovery of a verifiable digital secret

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040148509A1 (en) * 2001-03-23 2004-07-29 Yong Dong Wu Method of using biometric information for secret generation
US20020141575A1 (en) * 2001-03-29 2002-10-03 Hird Geoffrey R. Method and apparatus for secure cryptographic key generation, certification and use
US20040003246A1 (en) * 2002-06-28 2004-01-01 Compaq Information Technologies Group, L.P. Method and system for secure storage, transmission and control of cryptographic keys
US20080229103A1 (en) * 2007-03-13 2008-09-18 Board Of Trustees Of Michigan State University Private entity authentication for pervasive computing environments
US20100183148A1 (en) * 2009-01-19 2010-07-22 International Business Machines Corporation Recording keys in a broadcast-encryption-based system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11449588B2 (en) * 2019-03-18 2022-09-20 Lg Electronics Inc. Electronic device and method for controlling the same
US11218320B2 (en) * 2019-06-28 2022-01-04 Intel Corporation Accelerators for post-quantum cryptography secure hash-based signing and verification
US11575521B2 (en) 2019-06-28 2023-02-07 Intel Corporation Fast XMSS signature verification and nonce sampling process without signature expansion
US11770258B2 (en) 2019-06-28 2023-09-26 Intel Corporation Accelerators for post-quantum cryptography secure hash-based signing and verification
CN112434269A (en) * 2020-10-23 2021-03-02 上海点融信息科技有限责任公司 Zero knowledge proof method, verification method, computing device and storage medium of file
CN114584291A (en) * 2022-02-18 2022-06-03 杭州代码狗科技有限公司 Key protection method, device, equipment and storage medium based on HMAC algorithm

Also Published As

Publication number Publication date
EP3224983A1 (en) 2017-10-04
EP3224983B1 (en) 2024-09-04
CA2969332A1 (en) 2016-06-02
WO2016083618A1 (en) 2016-06-02
CA2969332C (en) 2024-01-23
US10547451B2 (en) 2020-01-28

Similar Documents

Publication Publication Date Title
AU2021203815B2 (en) Methods for secure cryptogram generation
US10547451B2 (en) Method and device for authentication
US10015159B2 (en) Terminal authentication system, server device, and terminal authentication method
US10511438B2 (en) Method, system and apparatus using forward-secure cryptography for passcode verification
CN104836784B (en) A kind of information processing method, client and server
CN104038486A (en) System and method for realizing user login identification based on identification type codes
US9679117B2 (en) System and method for obtaining an authorization key to use a product
CN103746802B (en) A kind of data processing method and mobile phone based on arranging key
WO2017109058A1 (en) Security management system for securing a communication between a remote server and an electronic device
KR101912403B1 (en) Method for security authentication between equipment
EP3361670B1 (en) Multi-ttp-based method and device for verifying validity of identity of entity
TWI633231B (en) Smart lock and smart lock control method

Legal Events

Date Code Title Description
AS Assignment

Owner name: KATHOLIEKE UNIVERSITEIT LEUVEN, BELGIUM

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:PEETERS, ROEL JOHAN CORNEEL;HERMANS, JENS;REEL/FRAME:043172/0114

Effective date: 20170626

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

AS Assignment

Owner name: NEXTAUTH NV, BELGIUM

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:KATHOLIEKE UNIVERSITEIT LEUVEN;REEL/FRAME:050767/0203

Effective date: 20191015

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT RECEIVED

STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

Year of fee payment: 4